Posted: Wed Mar 25, 2020 13:13 Post subject: New Build - 03/25/2020 - r42803
This thread is for feedback on beta build r42803 for developers and users (configuration, status, errors & logs).
Avoid discussions, create a new thread for specific problems, questions or use search as this is not for support.
Please report hardware model, version, operating & wireless modes along with file name (factory, webflash).
Important: if reporting issues, provide applicable info (syslog output, 'dmesg', 'cat /var/log/messages', etc.)
or place into an SVN ticket. For firewall issues, also provide iptables info ('iptables -L', 'iptables -t nat -L', & the /tmp/.ipt file).
Be sure to include operating and wireless modes (Gateway, AP, CB, etc.) along with any relevant configuration information.
Flashing any beta build assumes you are responsible, have researched, know the risks and recovery methods.
If you don't understand your router, which file or recovery methods do NOT flash this experimental test build.
Notes: 1. CVE-2019-14899 VPN fix from December, since then various revisions including recently 7024.
2. In-kernel Samba has been implemented this year and default min/max versions have changed, WSD now supported.
Joined: 10 Nov 2018 Posts: 350 Location: South Carolina
Posted: Wed Mar 25, 2020 15:38 Post subject: DD-WRT v3.0-r42803 std (03/25/20)
WRT3200ACM V1 r42803 Firefox 74 (64-bit) webflash
OpenVPN CLIENT seems ok so far (nordvpn server)
5GHz wpa2 CCMP-128 (AES)Seems ok 40MHz N
2.4GHz wpa2 CCMP-128 (AES)Seems ok 20MHz N
NAS via USB Samba conditional
At 18 hours up time, I still have the occasional samba request for credentials that don't exist that resolve with a <Apply Settings> on the NAS tab. I've tried a couple different NAS tab samba version settings. Still trying to figure out whats going on there. This only happens after a router reboot. Clients are windows 10.
Last edited by scar1943 on Thu Mar 26, 2020 13:28; edited 1 time in total
Posted: Wed Mar 25, 2020 19:25 Post subject: reply to scar1943
Hi - As I will let you be the guinea pig as I can live with occasional (rare for me) drops for my household, any chance you can do donwload/upload speed comparisons? If speeds are similar and you find it more stable, then I'll upgrade. Thanks!
Joined: 08 May 2018 Posts: 14246 Location: Texas, USA
Posted: Wed Mar 25, 2020 19:54 Post subject: Re: reply to scar1943
steve2088 wrote:
Hi - As I will let you be the guinea pig as I can live with occasional (rare for me) drops for my household, any chance you can do donwload/upload speed comparisons? If speeds are similar and you find it more stable, then I'll upgrade. Thanks!
Quote:
This thread is for feedback on beta build r42803 for developers and users (configuration, status, errors & logs). Avoid discussions, create a new thread for specific problems, questions or use search as this is not for support. Please report hardware model, version, operating & wireless modes along with file name (factory, webflash).
Many many thanks for keeping this development strong.
Linksys WRT1900ACS V2
Updated from r40009 to r42803, full reset
Wireless:
* 5GHz; Mode: AP; Channel: Auto; Channel width: Dynamic 20/40 MHz
* 2.4GHz; Mode: AP; Channel: Auto; Channel width: Full 20 MHz
* 2 VAP on 2.4GHz with net isolation on both
OpenVPN Server enabled
After first setup everything is working fine. Didn't see radio off issue on the 2.4GHz Wifi even with the 2 VAP. I have not tested samba yet.
After 1st router reboot, 5GHz SID cannot be seen by any client even though radio is on. Multiple follow up reboot didn't resolve this. The 2.4GHz wifi including the 2 VAPs continue to be working fine
Restoring setting from backup fixed the 5GHz Wifi SID, but it disappeared again after reboot.
Changing WiFi 5GHz channel from Auto to a specific Channel seem to fix it and it survived multiple reboot.
Interesting observation, when I checked via speedtest, my internet speed both download and upload is only 20 - 30% when connected to the 2.4GHz wifi compared to when connected to the 5GHz wifi using the same computer with the same distance to the router. Tested multiple times with same results. I didn't realize that the difference was that significant
Router: wrt3200acm
Release: 42803
Samba: min protocol: nt 1.0, max protocol: smb 3.11, encryption: off, files system: ext4
Samba works only on my Macbook pro.
Does not work on andriod or ios devices. On android, I can connect to the share but get an error message: access denied. ios devices cannot see the share.
Have tried both anonymous login as well as with username/ password. And no, the username was not root.
Trying to use samba reboots the router. _________________ WRT3200ACM - Firmware: DD-WRT v3.0-r35681 std (04/06/18).
WRT160N - Repeater - Firmware: DD-WRT v24-sp2 (02/02/15) mini.
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
Strange. After 42803 my 2.4g radio problems got solved no matter how much time is idle. Maybe try playing with the settings on the ath1 i use NG-Mixed beamforming,WMM disabled. 20mhz channel width. I advise you to use AC only on ath0 and NG mixed or N only on the ath1. Give it a go and see if this helps.
Had a chance to test Samba last night using Windows 10 PC connected to an NTFS drive connected on the router USB port. My PC can map the drive just fine, can access (read/write) the drive just fine.
However if I disconnect the share and reconnect, it causes the router to lose both internet and admin GUI access and the only way to recover is to physically switch off router and turn it back on. This will also continue to happen until I also rebooted my PC.
Another weird thing on Samba although I think this is an NTFS permission issue, not sure yet. I am using robocopy to backup certain directories on my PC to the share drive. 90% of the copy operation completed successfully. However there are certain directories where robocopy will complaint and unable to access. The error message is:
ERROR 58 (0x0000003A) The specified server cannot perform the requested operation
I've never seen this error with r40009. The error occurred on the same directory every single time, so I think it's NTFS permission rather than Samba, just weird it happen after I upgraded the firmware.
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
My router is currently in this state, devices are failing to authenticate. I was able to authenticate against the Ath0 interface(5GHz) Oddly I see authentication requests against my VAP at Ath1.1, which I am not trying to connect to:
Mar 30 18:21:22 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:25 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:27 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:29 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1: STA 08:78:08:5d:54:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mar 30 18:21:34 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:37 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:39 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: auth request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 3)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session 31561C36FBC10EA4
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPDISCOVER(br0) 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPOFFER(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:21:41 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:44 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:46 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -48 (Accepted)
Mar 30 18:21:48 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:52 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:54 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -52 (Accepted)
Mar 30 18:21:57 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:59 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:22:01 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:04 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:06 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:09 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
The connection in there is when I connected to the 5GHz AP to get the logs.
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
My router is currently in this state, devices are failing to authenticate. I was able to authenticate against the Ath0 interface(5GHz) Oddly I see authentication requests against my VAP at Ath1.1, which I am not trying to connect to:
Mar 30 18:21:22 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:25 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:27 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:29 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1: STA 08:78:08:5d:54:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mar 30 18:21:34 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:37 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:39 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: auth request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 3)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session 31561C36FBC10EA4
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPDISCOVER(br0) 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPOFFER(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:21:41 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:44 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:46 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -48 (Accepted)
Mar 30 18:21:48 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:52 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:54 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -52 (Accepted)
Mar 30 18:21:57 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:59 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:22:01 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:04 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:06 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:09 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
The connection in there is when I connected to the 5GHz AP to get the logs.
After reboot - no issues connecting to the network:
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: auth request, signal -69 (Accepted)
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -70 (Accepted)
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 3)
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session EE6DE0085612FA7F
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPDISCOVER(br0) 64:52:99:71:68:4f
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPOFFER(br0) 192.168.1.117 64:52:99:71:68:4f
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPREQUEST(br0) 192.168.1.117 64:52:99:71:68:4f
Mar 30 18:49:07 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPACK(br0) 192.168.1.117 64:52:99:71:68:4f MyQ-B8F
Mar 30 18:49:07 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:49:25 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a MLME: auth request, signal -57 (Accepted)
Mar 30 18:49:25 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -57 (Accepted)
Mar 30 18:49:25 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 2)
Mar 30 18:49:25 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session 16930DB568F85585
Mar 30 18:49:25 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:49:26 CarneyCottageRouter daemon.info hostapd: ath1: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:49:28 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:49:28 CarneyCottageRouter daemon.info dnsmasq-dhcp[1486]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
I had the same problem, and same log errors about DHCPDISCOVER and DHCPOFFER.
After reboot all devices connected again, but after some days it happened again.
Now back to v3.0-r42335 std (02/10/20).
Mike300zx wrote:
Mike300zx wrote:
Router: WRT3200ACM
Release: 42803
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
My router is currently in this state, devices are failing to authenticate. I was able to authenticate against the Ath0 interface(5GHz) Oddly I see authentication requests against my VAP at Ath1.1, which I am not trying to connect to:
Mar 30 18:21:22 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:25 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:27 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:29 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1: STA 08:78:08:5d:54:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mar 30 18:21:34 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:37 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:39 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: auth request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 3)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session 31561C36FBC10EA4
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPDISCOVER(br0) 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPOFFER(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:21:41 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:44 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:46 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -48 (Accepted)
Mar 30 18:21:48 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:52 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:54 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -52 (Accepted)
Mar 30 18:21:57 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:59 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:22:01 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:04 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:06 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:09 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
The connection in there is when I connected to the 5GHz AP to get the logs.
Been lurking around the forums for sometime.. anyways.. I have been trying to resolve my WRT3200ACM WiFi stopping working after a variable number of days. I was hopeful with 42803, but after 2 days ~14 hours I was unable to connect to the access point anymore on any new devices after I deleted the SSID(iOS, Android). oddly the error I received on the iOS device was "Incorrect Password". I went on an existing device that was still connected, and selected reboot router, and magically everything started working again.
I don't have anything special enabled.
Security is WPA2 Personal(AES) on all
WiFi Settings - pretty much default to try and stay as vanilla as possible
2.4GHz(ath1) Channel 11 AP, Mixed, and Full Bandwidth
5GHz(ath0) Channel 36, AP, Mixed, and Full Bandwidth
2.4/5GHz(ath2) Disabled as recommended
I also have a virtual interface on the ath1 for all my IoT devices, ath1.1, same security as above.
I've used OpenVPN on the router without issues. Willing to get any logs if anybody can walk me through it.
My router is currently in this state, devices are failing to authenticate. I was able to authenticate against the Ath0 interface(5GHz) Oddly I see authentication requests against my VAP at Ath1.1, which I am not trying to connect to:
Mar 30 18:21:22 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:25 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:27 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:29 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:32 CarneyCottageRouter daemon.info hostapd: ath1: STA 08:78:08:5d:54:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Mar 30 18:21:34 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:37 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -49 (Accepted)
Mar 30 18:21:39 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: auth request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a MLME: assoc request, signal -68 (Accepted)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: associated (aid 3)
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a RADIUS: starting accounting session 31561C36FBC10EA4
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a WPA: pairwise key handshake completed (RSN)
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPDISCOVER(br0) 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPOFFER(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPREQUEST(br0) 192.168.1.128 50:e0:85:4c:43:7a
Mar 30 18:21:40 CarneyCottageRouter daemon.info dnsmasq-dhcp[21029]: DHCPACK(br0) 192.168.1.128 50:e0:85:4c:43:7a MSI
Mar 30 18:21:40 CarneyCottageRouter daemon.info hostapd: ath0: STA 50:e0:85:4c:43:7a IEEE 802.11: authenticated
Mar 30 18:21:41 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:21:44 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:46 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -48 (Accepted)
Mar 30 18:21:48 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:52 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:54 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -52 (Accepted)
Mar 30 18:21:57 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:21:59 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
Mar 30 18:22:01 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:04 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:06 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -50 (Accepted)
Mar 30 18:22:09 CarneyCottageRouter daemon.info hostapd: ath1.1: STA cc:50:e3:af:42:58 MLME: auth request, signal -51 (Accepted)
The connection in there is when I connected to the 5GHz AP to get the logs.
I am seeing similar on my WRT1900ACSv2. After around 48 hours of stable operation, ath0 and ath1 just die. Reboots don't always bring back. Fell back to "Firmware: DD-WRT v3.0-r42335 std (02/10/20)" for stability.